{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:24:53Z","timestamp":1743128693199,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608102"},{"type":"electronic","value":"9789819608119"}],"license":[{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0811-9_2","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T17:28:50Z","timestamp":1734024530000},"page":"19-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of\u00a0Oversampling Techniques Under Neyman-Pearson Paradigm on\u00a0Credit Card Fraud Detection"],"prefix":"10.1007","author":[{"given":"Chujun","family":"Huang","sequence":"first","affiliation":[]},{"given":"Suijing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"You","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Anyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ping","family":"He","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,13]]},"reference":[{"issue":"5","key":"2_CR1","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1002\/sam.11538","volume":"14","author":"Y Feng","year":"2021","unstructured":"Feng, Y., Zhou, M., Tong, X.: Imbalanced classification: a paradigm-based review. Stat. Anal. Data Mining ASA Data Sci. J. 14(5), 383\u2013406 (2021)","journal-title":"Stat. Anal. Data Mining ASA Data Sci. J."},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ins.2017.04.046","volume":"408","author":"WA Rivera","year":"2017","unstructured":"Rivera, W.A.: Noise reduction a priori synthetic over-sampling for class imbalanced data sets. Inf. Sci. 408, 146\u2013161 (2017)","journal-title":"Inf. Sci."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Tong, X., Feng, Y., Li, J.J.: Neyman-Pearson classification algorithms and NP receiver operating characteristics. Sci. Adv. 4(2), eaao1659 (2018)","DOI":"10.1126\/sciadv.aao1659"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"He, H., Bai, Y., Garcia, E.A., Li, S.: ADASYN: adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 1322\u20131328. IEEE (2008)","DOI":"10.1109\/IJCNN.2008.4633969"},{"key":"2_CR6","unstructured":"Siriseriwan, W., Sinapiromsaran, K.: Adaptive neighbor synthetic minority oversampling technique under 1NN outcast handling. Songklanakarin J. Sci. Technol. 39(5) (2017)"},{"issue":"2","key":"2_CR7","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/TKDE.2012.232","volume":"26","author":"S Barua","year":"2012","unstructured":"Barua, S., Islam, M.M., Yao, X., Murase, K.: MWMOTE-majority weighted minority oversampling technique for imbalanced data set learning. IEEE Trans. Knowl. Data Eng. 26(2), 405\u2013425 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Hassanat, A.B., Tarawneh, A.S., Altarawneh, G.A., Almuhaimeed, A.: Stop oversampling for class imbalance learning: a critical review. arXiv preprint arXiv:2202.03579 (2022)","DOI":"10.21203\/rs.3.rs-1336037\/v1"},{"key":"2_CR9","unstructured":"Bungo, L., Attorney, S.: Think you know what the top scam of 2023 was? Take a guess. Consumer Advice (2024). https:\/\/consumer.ftc.gov\/consumer-alerts\/2024\/02\/think-you-know-what-top-scam-2023-was-take-guess"},{"key":"2_CR10","unstructured":"Zheng, X.: SMOTE Variants for Imbalanced Binary Classification: Heart Disease Prediction. Escholarship.org (2020). https:\/\/escholarship.org\/uc\/item\/99x0w9w0"},{"key":"2_CR11","unstructured":"Shah, A., Makwana, Y.: Credit Card Fraud Detection (2023)"},{"key":"2_CR12","unstructured":"Madkaikar, K., Nagvekar, M., Parab, P., Raika, R., Patil, S. H.: Credit card fraud detection system. Int. J. Recent Technol. Eng. (IJRTE) (2021). https:\/\/api.semanticscholar.org\/CorpusID:238779101"},{"key":"2_CR13","unstructured":"Teja, B.M.S.S., Munendra, B., Gokulkrishnan, S.: A research paper on credit card fraud detection. IRJET J. (2022). https:\/\/issuu.com\/irjet\/docs\/irjet-v9i3216"},{"key":"2_CR14","unstructured":"Sharma, N.: Credit card fraud detection predictive modeling. Library.ndsu.edu (2019). https:\/\/hdl.handle.net\/10365\/31611"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.procs.2020.01.057","volume":"165","author":"VN Dornadula","year":"2019","unstructured":"Dornadula, V.N., Geetha, S.: Credit card fraud detection using machine learning algorithms. Procedia Comput. Sci. 165, 631\u2013641 (2019). https:\/\/doi.org\/10.1016\/j.procs.2020.01.057","journal-title":"Procedia Comput. Sci."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1186\/s40537-022-00573-8","volume":"9","author":"E Ileberi","year":"2022","unstructured":"Ileberi, E., Sun, Y., Wang, Z.: A machine learning based credit card fraud detection using the GA algorithm for feature selection. J. Big Data 9, 24 (2022). https:\/\/doi.org\/10.1186\/s40537-022-00573-8","journal-title":"J. Big Data"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Wahl, S., et al.: On the potential of models for location and scale for genome-wide DNA methylation data. BMC Bioinf. 15, 232 (2014). https:\/\/doi.org\/10.1186\/1471-2105-15-232. PMID: 24994026; PMCID: PMC4227139","DOI":"10.1186\/1471-2105-15-232"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0811-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T18:02:16Z","timestamp":1734026536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0811-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,13]]},"ISBN":["9789819608102","9789819608119"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0811-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,13]]},"assertion":[{"value":"13 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2024.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}